CXOTech Magazine
0 FOLLOWERS
Explore the Technology Magazine for IT Leaders & Enterprise Solutions. Insight TechMedia Inc. is the parent company of this website. CXOTech is a leading technology magazine that explores the technology and industry issues – and shares success stories – relevant to IT leaders and managers at industry and organizations evaluating and implementing solutions.
CXOTech Magazine
3d ago
By Emily Newton is a tech journalist with over five years of experience covering how technology is changing industry and business. Keep up with Emily by connecting with her on LinkedIn
Edge computing promises to revolutionize the way many industries operate. It will usher in a new era of connectivity, take automation to new heights and finally make self-driving cars a reality. In order to get there, though, you have to consider edge computing infrastructure.
This side of edge computing is easy to overlook, but it is important not to. Physical factors make a much bigger difference wh ..read more
CXOTech Magazine
1w ago
By Jeffery Squibb, Information Security Administrator/Infrastructure Lead, SoutheastHEALTH
In an era where the digital landscape is continuously evolving, Cybersecurity has become paramount for individuals, businesses, and governments worldwide. This article delves into the evolution of Cybersecurity, its current state, the challenges and strategies involved in safeguarding digital assets, and a look into the future of this ever-important field.
Anyone can trace the journey of Cybersecurity back to the 1970s with the development of the Advanced Research Projects Agency Network (ARPANET), the ..read more
CXOTech Magazine
2w ago
By Neha Purohit, Vice President, Data and Analytics, United Talent Agency Introduction
Two paradigms are leading this change in an era where industry and technology have combined to create previously unheard-of growth and innovation: MLOps and DevOps. The differentiation and convergence of these techniques serve as the cornerstone for upcoming breakthroughs as we manage the complexity of the Industrial Revolution.
They go beyond simple operational tactics. This article thoroughly explores the differences between MLOps and DevOps, highlighting their distinct functions, complementary qualities ..read more
CXOTech Magazine
3w ago
By Lester Godsey, Chief Information Security Officer, Maricopa County
The following is the definition of cyber risk, per ChatGPT: “. . . the potential harm or damage that can arise from the use of technology and information systems, particularly in the context of cybersecurity. It encompasses the likelihood of a cyber threat exploiting vulnerabilities in an organization’s systems, networks, or digital assets, leading to adverse consequences.” While this characterization of cyber risk certainly holds true today, there are some factors in play that should make organizations rethink how they def ..read more
CXOTech Magazine
3w ago
By John Chavner, Director, Technology and Cloud Development, VoltaGrid
Introduction: Revolutionizing Power Generation through Mobility
The world of power generation has long been associated with massive stationary infrastructure, such as power plants and substations. However, in recent years, a silent revolution has been unfolding in the energy sector. It’s a transformation that involves harnessing the power of mobility, data, and edge computing to create dynamic and responsive energy solutions.
VoltaGrid, a company born from the intersection of innovation and necessity, stands as a testament ..read more
CXOTech Magazine
3w ago
By Igor Tosic, Managing Director – Global Head of Application & Data Architecture, Brown Brothers Harriman Introduction:
The recent pronouncements by industry leaders UiPath and Automation Anywhere on the demise of the term “Robotic Process Automation” (RPA) have sparked debates about the true nature of RPA’s existence. In the subsequent discussion, I will delve into the historical context of RPA, its evolution from mainframe screen scraping technologies, and the emergence of its latest variant, named “Integrated Automation,” as another iteration of the same technology. We should question ..read more
CXOTech Magazine
3w ago
By Brandie Shatto, Program Director & Professor | Educational Technology, University of Maryland Global Campus
In the ongoing debate over the use of generative artificial intelligence (AI) in education, there are mixed feelings. Some are hesitant about adopting AI, feeling anxious about the rapid pace at which these technologies are advancing and uncertain about the questions that have yet to be answered when it comes to responsible use of AI. Others have been using, experimenting with, and advocating for its adoption since OpenAI’s ChatGPT first burst onto the scene. In this technologica ..read more
CXOTech Magazine
3w ago
My Experience as Regional Cyber Security Chief for the US Army Regional Network Center
By Gary Trautmann, Senior Cyber Security Advisor to Mongolian Armed Forces Cyber Command, Sincerus Global
What is regionalization and/or centralizing efforts? This is an initiative that brings assets into a unique location to enhance oversight and control of efforts. In cyber security, it is an effort to provide better security and reduce the possible ‘weak’ links in the chain that could provide a vulnerability for exploitation.
When I was hired in 2022 as the Chief of Cyber Security for the Northeast Regio ..read more
CXOTech Magazine
3w ago
By Steven Keith Platt, Director of Analytics and Lecturer of Applied AI and Statistics, Quinlan School of Business, Loyola University Chicago
The outlook for the AI industry is outstanding and organizations continue to ramp up their investments. Yet many encounter issues in reaching their AI aspirations. This can be attributable to factors such as a failure to adequately address AI risks, lagging digitization efforts, and HR concerns. However, the most challenging are those related to organizational issues. To address this, business schools need to focus on educating their students to become ..read more
CXOTech Magazine
3w ago
By Carmine Valente, CISSP | CISM | CISA, Vice President of Information Security at Paramount Global
Corporate organizations have historically been characterized by various interconnected business environments, often relying on third-party providers and partners to enhance efficiency and streamline operations. While these collaborations are essential to day-to-day business operations, bringing numerous benefits, they also expose companies to a myriad of risks. In the past few years, third-party risk management (TPRM) has emerged as a critical aspect of risk management, allowing organizations t ..read more